TheBrothersWISP 86 – Mikrotik IPv6 Vulnerability, MTK Indoor, Technology’s Impact

This week Greg, Tomas, Mike, and Wilson get down with the get down. Get ready towards the end, because we go on some nontechnical discussion on technology’s impact on us in our daily lives along with how the technology we facilitate changes people(we go deep bro).

This cast we talk about:
Mikrotik Update: GPEN to GPEN 210M, GPEN to standard ethernet device 100M
Mikrotik CVE-2018-19299 issue(public release in 10 days). Memory leak due to IPv6 crafted packets moving through router – it seems SOME of it has been fixed in 6.45beta22.
MUM Austin – Gus’ chicken, live show, Master Pancake Theater
MikroTik 802.11 indoor vs. TP-Link
TP-Link Archer C5400 vs. Tik cAP

*slack updates*
ROS 6.45beta22 fixes Steve’s EAP Radius issues
Remote admin clients –
Greg converted a Cisco 7200 to an ASR9000
Ciena sent me sales engineers, you’ll never believe what happened next
Mikrotik CRS3xx series are going into production for a lot of us – hardware DHCPsnooping, port isolation, DHCP option 82, vlan filtering, STP
Thrift quote of the week “Stacking is not suitable for highly available networks, it is a technology of convenience not of reliability” Stacking vs MC-LAG

Orville season 2 e11 – lasting impressions
Wondering conversation about the impact of technology on life
Putty / WinSCP vulnerabilities – update now
Udemy Complete Networking Fundamentals

Help support us by becoming a patron! <==join our Slack team! Keep contacting us: contactus (at) or

Here’s the video:(if you don’t see it, hit refresh)


2 responses to “TheBrothersWISP 86 – Mikrotik IPv6 Vulnerability, MTK Indoor, Technology’s Impact”

  1. Marek Isalski Avatar
    Marek Isalski

    Hey, it’s been a year since all this went down.

    Did you ever do a follow-up episode to this one where you speculated that I was going to ransom everyone using RouterOS?


    1. greg Avatar

      Marek, we don’t usually circle back(our memories are too short).

Leave a Reply

Your email address will not be published. Required fields are marked *